Analysis
-
max time kernel
41s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-08-2022 22:43
Static task
static1
Behavioral task
behavioral1
Sample
JsUDviXDiDBFhx.dll
Resource
win7-20220812-en
General
-
Target
JsUDviXDiDBFhx.dll
-
Size
1.8MB
-
MD5
bce81d0fe5a5f2ec833b1890fa8a1cc5
-
SHA1
6c1e9bea7c9e7057ef40946abb97a3e60026a61c
-
SHA256
d70e30304c53b7b9f9f5d4409f0ac9b6713709d45fdc1f1bf65fe9f1ad539d1d
-
SHA512
de6ca51763ae07548208da7931f992d26ab357141d6a1b1d54f54f66f83a7317756f6a6ae8c0a47e9d379c15eb4eecf8596c12c70cd9e8c7f888b0d16d1a46c0
-
SSDEEP
24576:0N874KCVg2wUnXrUupzjXxbXQvHYOsmzOTp+U7pXXUL7SmI5y0fvFj1kqRIN3Qtt:0N87jcHwgXr5tToHYOsmSTx7pXkOy
Malware Config
Extracted
bumblebee
2608
106.105.40.37:281
224.63.194.81:125
122.61.32.33:499
195.167.135.231:104
253.87.116.144:132
115.118.214.197:398
208.46.210.160:259
151.45.81.241:319
231.115.169.144:479
211.3.163.223:438
205.185.116.99:443
72.129.220.46:326
58.237.169.212:157
116.14.243.168:325
172.115.124.76:463
197.182.124.10:479
59.253.233.208:344
37.224.208.59:206
186.92.108.120:154
198.98.52.246:443
146.243.10.253:187
125.43.127.201:114
172.52.254.121:162
83.54.134.193:384
8.191.152.153:329
138.17.56.242:269
175.162.216.194:425
8.69.188.109:281
58.190.59.72:188
113.239.8.211:430
84.237.65.104:408
233.220.246.22:495
15.83.224.143:311
104.168.204.115:443
24.247.40.38:157
107.189.5.45:443
29.8.151.2:239
225.110.191.221:439
113.129.74.180:169
91.220.35.64:100
3.158.200.196:374
82.117.140.112:498
237.141.95.14:345
100.250.176.199:251
164.158.205.102:101
52.147.194.216:383
136.62.162.58:494
24.254.148.210:458
247.13.150.239:150
23.123.41.93:409
219.74.248.35:154
47.83.231.100:190
105.196.240.33:280
46.68.61.242:117
Signatures
-
Enumerates VirtualBox registry keys 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxGuest regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxMouse regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxService regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxVideo regsvr32.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\FADT\VBOX__ regsvr32.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\RSDT\VBOX__ regsvr32.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions regsvr32.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion regsvr32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate regsvr32.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Wine regsvr32.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2012 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe 2012 regsvr32.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\JsUDviXDiDBFhx.dll1⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2012